Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Software above the level of a single device.

Data is replicated, no item exists only in one place.

Data is shared, shareable and in formats that can be operated on both by the owner and by the user, the visitor, the renter, the spectator of the items in question.

Data is encrypted, watermarked, tagged, associated to immutable provenance histories.

Data is ephemeral, guaranteed to be forgotten, subject to erasure, intended to be unrecoverable once used.

The network is reliable. The network is unavailable. The network is on the side of the people. The network will stab you in the back when you least expect it.

Some programmers will insist on writing javascript to control medical devices. Some programmers will insist that casual games running in sandboxed environments be provably correct.

Someone will cobble together an AI and set it to rewriting enterprise java apps, when interviewed after the disaster the AI will claim that humanity "had it coming".

A software bug will start a small war. And a EULA clause will end another one.

You will be completely transparent and documented for everyone else to see. You will not have sufficient permissions to find out anything about anyone with any power over you.

Most applications will incorporate blockchain technology; but bitcoin will be the subject of jokes and nostalgic pop culture trivia questions.

It will be the best of times ( for some ), and the worst of times ( for others ).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: